(adsbygoogle = window.adsbygoogle || []).push({});
Note; I, BleedingPainter, am not responsible for any action followed by this post. This post is for educational purposes only and should not be acted upon in any way. When using these methods for your benefit, you forfeit any affiliation with BleedingPainter and NextGenUpdate.com.
This is my second thread posted on NextGen and I would like to thank all who +rep on my last thread! I hope this will be even better than my last Thanks!
When playing a game when I was much younger called HabboHotel, I never wanted to pay money for you know.. money and items that never really excisted because they were pixels. So I soon learned to gain access to people's computers, making their pixels, my pixels. Soon I did this to almost every game I played, making it just that much more fun! RuneScape, SecondLife, blah blah blah. But I will show you how to easily gain access to whoever you'd like, in a very easy manner.
A Key Log records all typed keystrokes, visited web sites, system logon passwords, clipboard usage, passwords behind asterisks and much more in total stealth
Easiest Keylogger to use: Soft Central Keylog, the earlier version you can find the better.
Setting up the keylogger using SC;
1.set up the ardamax keylogger, and right
click the little icon in the taks bar.if its not
there, push ctrl+shift+alt+H.
2.once you have right
clicked it, click "remote installation".
3.configure it
like the following:
click next untill you get to security.
push "enable" and set a password that you will
remember.click next.
were it says, check for updates, make sure this
is unchecked.click next untill it says control.
click "send logs every"and configure it to your
liking.this is so it sends the logs to your email.
4.put in your email address, and click "test".if it
doesnt work, try a few more times.if it doesnt
work after that, you may have to use an SMPT
server.use google.the ideal email is gmail.
5.just click next untill your finished,
theres nothing needed to be done.
Send it to people you do not like, advertise it on your website, bind it to another program. The sky is the limit
Basic Trojaning using ProRat
Part 1: Making the server
yes i know this is not the best place to start, but i seems logical that you do this first, so, open Prorat, on the left side you see buttons, go ahead and experiment, they dont do much right now.
now, click "Create" and you will be faced with a few options. click "Create ProRat server" for now. this options will make the file (server) that has to be run on the other person (vitims) 's computer, so that you can gain access to it.
now the first thing you see here is notifcations, this is important, you need prorat to send you back an IP address to which you can connect to, so make sure at elast one of them works, select the one you wish to use, and TEST IT, i use ICQ, i know that works, and i could not get email to work for me, but its ok, i manage with ICQ
when u test, ill use ICQ as an example, u get a message. this will be the exact message that you will see, but showing your ip address, this is what somebody else might see if they infected you.
move on to general settings, and select what you like, i keep the port the same, but this is up to you. an error message is clever, without it, the program looks like it does nothing, because other then that, nothing opens up. i recoment killing AV-FW (antivirus / firewall) because then you are undetectable. also, disable windows firewall. the rest is up to you
the next few are self explanetory, binding with file is not required, but is a good options when mass-infection is required. server extenstions - self explanetory, as well as icon...... dont pick something too obvious, be a little stealthy :p
now create the server
Part 2: Connection
assuming that you gave the program to somebody, and then ran it, you got your notification with their IP address, and now you want to connect to them, here is what you do:
in the main program, stick in their ip address into the IP box, and the port that you chose for the server in the port box. if all went right, you should hear a satisfying ping, and a message box asking for your password, this is to make sure that you are the only person that can access an infected computer.
thats it, you are connected
Thanks and much contribution from and to rebelflyy and ghostdogethicalhacking
Hope everyone can use this!